Sponsored Content
Special Forums IP Networking Need to know reason for connections closed in netstat -p tcp Post 302899589 by vbe on Wednesday 30th of April 2014 09:00:42 AM
Old 04-30-2014
So why did it work in your first post or was it something else? In which case you to give CORRECT information and not false the the output in such way you confuse your peer and waste their time!
 

8 More Discussions You Might Find Interesting

1. SCO

tcp port always closed in inetd

sco unix 5.0.x, several weeks ago, I add a telnet-like service in inetd.conf, it runs well for 100 network terminals. But nowdays, the terminals can connect to server successfully after booting machine, but several hours later, can not connect. "netstat -p tcp -a" can NOT find the port in... (1 Reply)
Discussion started by: shark_gao
1 Replies

2. Post Here to Contact Site Administrators and Moderators

Thread was closed without a valid reason

Dear Administrators, I think Mr. Vino is one of your Moderators here because he closes this thread: https://www.unix.com/showthread.php?p=302086230#post302086230 without a valid reason. Rule 7 states no headhunters or recruiters, but career advice is not prohibited here i think, because it... (2 Replies)
Discussion started by: patras
2 Replies

3. SCO

all tcp are CLOSED on SCO Unix on VMWARE

Hi folks, First of all, sorry about my english, isn't the best and thks for advance. Here es my problem... I have virtualize an SCO unix with VMware ESX 3 and everything was going on beatifull until that i try to connect from anorther host, i can't do it so i check the connection with... (5 Replies)
Discussion started by: martocapo
5 Replies

4. Red Hat

How to kill all active tcp connections from an IP?

How to kill all active tcp connections from an IP? I am using CentOS (3 Replies)
Discussion started by: an00p
3 Replies

5. Solaris

How to kill the TCP ESTABLISHED connection in netstat

Hello, Actually there are some bugs in application which does not close the TCP connection to other server though CORBA. We need to kill that ESTABLISHED connections as new connection are not happeneing as the allocated ports were used and showing as ESTABLISHED Is there any... (4 Replies)
Discussion started by: GIC1986
4 Replies

6. UNIX for Dummies Questions & Answers

TCP failed connection attempts from netstat -s

Dear experts, I am seeing a lot of TCP failed connection attempts from "netstat -s" on one of our servers. How can I pin point what connection failed and what are the ports involved? Any tools/commands I can dig in deeper to diag. what went wrong on these "failed connection attempts"? ... (2 Replies)
Discussion started by: cache51
2 Replies

7. Solaris

Connections closed for all applications

I've recently installed Solaris 10 10/9 in a new Dell Power Edge 630. Whenever I try to telnet, ssh, or FTP TO this box FROM another box on the same network segment, the following occurs: Roughly 80% of the time I get "Unable to connect to remote host: Connection refused" The remaining 20%... (0 Replies)
Discussion started by: cvaughn
0 Replies

8. IP Networking

Connections not shown in netstat output

I have a TCPIP server application (a Vendor package) which by default allows 10 connections. It provides a parameter to allow us to increase the maximum allowable connections in case it is needed. Intermittently this application is failing with maximum number of connections reached even when there... (1 Reply)
Discussion started by: AIX_user
1 Replies
SSL_get_peer_cert_chain(3)					      OpenSSL						SSL_get_peer_cert_chain(3)

NAME
SSL_get_peer_cert_chain - get the X509 certificate chain of the peer LIBRARY
libcrypto, -lcrypto SYNOPSIS
#include <openssl/ssl.h> STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *ssl); DESCRIPTION
SSL_get_peer_cert_chain() returns a pointer to STACK_OF(X509) certificates forming the certificate chain of the peer. If called on the client side, the stack also contains the peer's certificate; if called on the server side, the peer's certificate must be obtained separately using SSL_get_peer_certificate(3). If the peer did not present a certificate, NULL is returned. NOTES
The peer certificate chain is not necessarily available after reusing a session, in which case a NULL pointer is returned. The reference count of the STACK_OF(X509) object is not incremented. If the corresponding session is freed, the pointer must not be used any longer. RETURN VALUES
The following return values can occur: NULL No certificate was presented by the peer or no connection was established or the certificate chain is no longer available when a session is reused. Pointer to a STACK_OF(X509) The return value points to the certificate chain presented by the peer. SEE ALSO
ssl(3), SSL_get_peer_certificate(3) 1.0.1i 2014-06-05 SSL_get_peer_cert_chain(3)
All times are GMT -4. The time now is 03:50 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy